WO2002029566A1 - Digital video recorder for encrypting/decrypting video programs - Google Patents

Digital video recorder for encrypting/decrypting video programs Download PDF

Info

Publication number
WO2002029566A1
WO2002029566A1 PCT/US2001/042226 US0142226W WO0229566A1 WO 2002029566 A1 WO2002029566 A1 WO 2002029566A1 US 0142226 W US0142226 W US 0142226W WO 0229566 A1 WO0229566 A1 WO 0229566A1
Authority
WO
WIPO (PCT)
Prior art keywords
encrypted
video program
plaintext
segments
segment
Prior art date
Application number
PCT/US2001/042226
Other languages
French (fr)
Inventor
William B. Boyle
Alan P. Rice
Original Assignee
Keen Personal Media, Inc.
Keen Personal Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Keen Personal Media, Inc., Keen Personal Technologies, Inc. filed Critical Keen Personal Media, Inc.
Priority to AU2001293289A priority Critical patent/AU2001293289A1/en
Publication of WO2002029566A1 publication Critical patent/WO2002029566A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/78Television signal recording using magnetic recording
    • H04N5/782Television signal recording using magnetic recording on tape
    • H04N5/783Adaptations for reproducing at a rate different from the recording rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Definitions

  • the present invention relates to digital video recorders. More particularly, the present invention relates to a digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features.
  • DVRs Digital video recorders
  • RAS random access storage
  • HDD hard disk drive
  • the trick play features are enabled by processing frame headers which are recorded in arbitrary length frames of the video program. Due to the arbitrary frame lengths, the video programs are typically processed in unencrypted form in order to detect frame headers which identify frame boundaries.
  • prior art DVRs typically store copyrighted video programs in unencrypted form so that the DVR can randomly access individual frames during playback.
  • This design subjects the copyrighted material to unauthorized reproduction, for example, by eavesdropping while the copyrighted content is transferred from the DVR host circuitry to the RAS device.
  • Prior art DVRs typically employ a conventional hard disk drive (HDD), such as an IDE hard disk drive, as the RAS device since HDDs have sufficient capacity to store video content and are relatively inexpensive due to their prevalent use in personal computers (PCs).
  • HDD hard disk drive
  • PCs personal computers
  • DVRs are constructed similar to a PC, including DVR host circuitry for interfacing with a commodity HDD which reduces the cost of the DVR.
  • Using a conventional HDD has rendered the DVR more susceptible to unauthorized copying of video programs since the HDD can be removed and installed in another DVR or in a PC.
  • the present invention may be regarded as a digital video recorder (DVR) for storing a plaintext video program as an encrypted video program.
  • the DVR comprises a random access storage (RAS) device for storing the encrypted video program in encrypted segments.
  • the DVR further comprises a cryptography facility comprising an encoder for encrypting plaintext segments of the plaintext video program into the encrypted segments stored on the RAS device, and a decoder for randomly and independently decrypting the encrypted segments of the encrypted video program into plaintext segments during playback.
  • the cryptography facility comprises a pseudo-random sequence generator for generating a pseudo-random sequence.
  • the pseudo-random sequence generator is initialized with segment seed values corresponding to the plaintext segments of the plaintext video program , and the encoder combines the pseudo-random sequence generated for each segment seed value with the plaintext segments of the plaintext video program to generate the encrypted segments of the encrypted video program stored on the RAS device.
  • the pseudo-random sequence generator is initialized with segment seed values corresponding to the encrypted segments of the encrypted video program, and the decoder combines the pseudo-random sequence generated for each segment seed value with the encrypted segments of the encrypted video program to generate the plaintext segments of the plaintext video program.
  • the RAS device comprises a hard disk drive (HDD) comprising a disk, the disk comprises a plurality of data tracks, each track comprises a plurality of data sectors, and each data sector stores an encrypted segment of the encrypted video program.
  • HDD hard disk drive
  • the present invention may also be regarded as a method for processing a video program in a digital video recorder comprising a random access storage (RAS) device.
  • Plaintext segments of a plaintext video program are encrypted into encrypted segments.
  • the encrypted segments are stored on the RAS device and, during playback, randomly read from the RAS device.
  • Each encrypted segment is then independently decrypted into a plaintext segment.
  • FIG. 1 shows a digital video recorder according to an embodiment of the present invention wherein a video program is encrypted in segments, and the encrypted segments stored on a random access storage device.
  • FIG. 2 shows a digital video recorder according to an alternative embodiment of the present invention wherein video programs are stored in encrypted form on a hard disk drive (HDD) using plaintext keys which are also encrypted using a pseudo-random sequence generated from a unique ID and stored in encrypted file system entries on the HDD.
  • HDD hard disk drive
  • FIG. 3 A shows a programmable file system (FS) polynomial implemented using a linear feedback shift register (LFSR) for generating the pseudo-random sequence of FIG. 2, wherein a seed value is generated for the LFSR from the unique ID.
  • FIG. 3B shows a programmable FS polynomial implemented using a LFSR for generating the pseudo-random sequence of FIG. 2, wherein coefficient values are generated for the LFSR from the unique ID.
  • FS programmable file system
  • LFSR linear feedback shift register
  • FIG. 4A shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key as a seed value for the LFSR
  • FIG. 4B shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key, wherein a seed value is generated from the plaintext key.
  • a plurality of segment seed values are generated from the plaintext key wherein each segment seed value is used to encrypt a corresponding segment of the plaintext video program.
  • FIG. 4C shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key, wherein coefficient values are generated from the plaintext key.
  • sets of coefficient values are generated from the plaintext key wherein each set of coefficient values is used to encrypt a corresponding segment of the plaintext video program.
  • FIG. 1 shows a digital video recorder (DVR) 1 for storing a plaintext video program as an encrypted video program according to an embodiment of the present invention.
  • the DVR 1 comprises a random access storage (RAS) device 3 for storing the encrypted video program in encrypted segments 5.
  • the DVR 1 further comprises a cryptography facility 14 comprising an encoder 24 for encrypting plaintext segments 7A of the plaintext video program into the encrypted segments 5 stored on the RAS device 3, and a decoder 26 for randomly and independently decrypting the encrypted segments 5 of the encrypted video program into plaintext segments 7B during playback.
  • the DVR 1 of FIG. 1 further comprises a video controller 28 for receiving video data 30 from an external entity (e.g., a cable or satellite) and for providing video data 34 to a display device during playback.
  • the video controller 28 processes the headers in the video frames of the video data 30 in order to implement trick play features.
  • Certain trick play features such as skip ahead or behind, require that the video program be accessed randomly rather than in a consecutive sequence of frames.
  • the DVR 1 of FIG. 1 facilitates this feature by decrypting the video program in segments.
  • the video controller 28 When the video controller 28 requires access to a particular segment of the video program, it initializes the decoder 26 with an appropriate segment key for decrypting the video segment as it is read from the RAS device 3.
  • FIG. 2 shows a DVR 2 according to an embodiment of the present invention wherein the RAS device 3 of FIG. 1 is implemented as a hard disk drive (HDD) 6.
  • the HDD 6 stores a plurality of encrypted video programs 8 and an encrypted file system, the encrypted file system comprising a plurality of encrypted file system entries 10 for decrypting the plurality of encrypted video programs 8.
  • the DVR 2 further comprises host circuitry 12 for interfacing with the HDD 6, the host circuitry 12 comprising the cryptography facility 14 for encrypting plaintext file system entries 16A into the encrypted file system entries 10 stored on the HDD 6, and for decrypting the encrypted file system entries 10 read from the HDD 6 into plaintext file system entries 16B.
  • the cryptography facility 14 comprises a pseudo-random sequence generator 20, responsive to the unique ID 4, for generating a pseudo-random sequence 22.
  • the cryptography facility 14 further comprises an encoder 24 for combining the pseudorandom sequence 22 with the plaintext file system entries 16A to generate the encrypted file system entries 10 stored on the HDD 6, and a decoder 26 for combining the pseudo-random sequence 22 with the encrypted file system entries 10 read from the HDD 6 to generate the plaintext file system entries 16B.
  • the encoder 24 of FIG. 2 performs the encryption operation by XORing each element (e.g., byte) of the plaintext file system entry 16A with a corresponding element (e.g., byte) of the pseudo-random sequence 22.
  • the decoder 26 performs the decryption operation by XORing each element (e.g., byte) of the encrypted file system entry 10 with a corresponding element (e.g., byte) of the pseudo-random sequence 22 to generate the plaintext file system entry 16B.
  • the video controller 28 generates control signals 32 for controlling the operation of the cryptography facility 14 when recording an encrypted video program 8, together with the encrypted file system entry 10 for decrypting the encrypted video program 8.
  • the video controller also processes the decrypted file system entries 16B so that the encrypted video programs 8 can be decrypted and output as video data 34 to a display device.
  • the file system entries 10 are stored in encrypted form relative to the unique ID 4 assigned to the DVR 2, the encrypted video programs 8 stored on the HDD 6 cannot be decrypted by connecting the HDD 6 to another DVR or to a PC. In effect, the HDD 6 is married to the host circuitry 12 of the DVR 2 through the unique ID 4 which protects against unauthorized copying.
  • the encrypted file system entries 10 are transparent to the operation of the HDD 6 so that any conventional HDD 6 may be employed without modification.
  • the plaintext file system entry 16A comprises a plaintext key for encrypting a plaintext video program into an encrypted video program 8 stored on the HDD 6.
  • the cryptography facility 14 encrypts the plaintext video program into an encrypted video program 8 stored on the HDD 6, and encrypts the plaintext key into an encrypted key stored on the HDD 6 in an encrypted file system entry 10.
  • the encoder 24 combines the pseudo-random sequence 22 with the plaintext video program to generate the encrypted video program 8 stored on the HDD 6.
  • the encrypted file system entry 10 comprises an encrypted key for decrypting an encrypted video program 8 read from the HDD 6 into a plaintext video program.
  • the cryptography facility 14 decrypts the encrypted key read from encrypted file system entry 10 into a plaintext key, and decrypts the encrypted video program 8 read from the HDD 6 using the plaintext key.
  • the decoder 26 combines the pseudo- random sequence 22 with the encrypted video program 8 read from the HDD 6 to generate the plaintext video program.
  • the pseudo-random sequence generator 20 comprises a programmable file system (FS) polynomial for generating the pseudo-random sequence 22.
  • the programmable FS polynomial is programmed with coefficients which, in one embodiment, are generated by a coefficient generator responsive to the unique ID 4.
  • the programmable FS polynomial is programmed with a seed value which, in one embodiment, is generated by a seed value generator responsive to the unique ID 4.
  • FIG. 3 A shows an embodiment of the present invention wherein the FS polynomial is implemented using a suitable linear feedback register (LFSR) 36.
  • LFSR linear feedback register
  • An LFSR may be implemented using a number of different configurations.
  • the LFSR 36 of FIG. 3 A comprises a shift register 38 comprising N storage elements which are initialized with a seed value 40 generated by a seed value generator 50 from the unique ID 4.
  • a number of taps 42A-42E connect a corresponding number of the storage elements to an adder 44 for adding the values stored in the storage elements.
  • the resulting sum 44 is fed back 46 to an input of the LFSR 36.
  • the LFSR 36 is shifted from left to right, and the right most storage element 48 outputs each value of the pseudo-random sequence 22.
  • FIG. 3B shows an alternative embodiment of the present invention wherein the FS polynomial is implemented using an LFSR 52 comprising programmable coefficients 54 0 -54 N *
  • a coefficient generator 56 generates coefficient values 58 for programming each of the programmable coefficients 54 0 -54 N .
  • the coefficients are binary valued and the programmable coefficients 54 0 -54 N are implemented as switches.
  • the FS polynomial is implemented using an LFSR comprising both a programmable seed value and programmable coefficients values which are generated from the unique ID 4.
  • the seed value generator 50 implements a function f(x), such as a polynomial, with the unique ID 4 as the input argument x and the seed value 40 the result.
  • the seed value generator 50 comprises a programmable algorithm for computing the seed value 40 from the unique ED 4. This embodiment allows a DVR manufacture to select the function f(x) for implementing a line of DVRs. This embodiment also allows an external entity to update the programmable algorithm to protect against system compromise. For example, in one embodiment the DVR 2 of FIG.
  • the coefficient value generator 56 implements a plurality of functions f(x), such as a plurality of polynomials, with the unique ID as the input argument x and the coefficient values 58 the result of each function f(x).
  • the coefficient value generator 56 may also implement a programmable algorithm for computing the coefficient values 58 to facilitate different DVR manufactures and to protect against system compromise as described above.
  • the seed value generator 50 comprises a seed table comprising a plurality of table entries, each table entry comprising a seed value.
  • An index generator responsive to the unique ID 4, generates an index into the seed table.
  • the coefficient value generator 56 comprises a coefficient table comprising a plurality of table entries, each table entry comprising coefficient values. An index generator, responsive to the unique ID 4, generates an index into the coefficient table.
  • FIG. 4A shows an alternative embodiment of the present invention as comprising a programmable LFSR 59 for generating a pseudo-random sequence 22 used to encrypt a plaintext video program into an encrypted video program 8 stored on the HDD 6.
  • a plaintext key 18 is used as a seed value for the LFSR 59, where the plaintext key 18 is associated with the plaintext video program.
  • the plaintext key is derived from the filename or other attribute of the video program.
  • the plaintext key is generated randomly using any suitable method, for example, by reading a system clock value just prior to encrypting the plaintext video.
  • FIG. 4B shows an alternative embodiment of the present invention as comprising a programmable LFSR 60 for generating a pseudo-random sequence 22 used to encrypt a plaintext video program into an encrypted video program 8 stored on the HDD 6.
  • a seed value generator 62 generates a seed value 64 used to initialize the shift register 38. The seed value 64 is generated from the plaintext key 18 used to encrypt the plaintext video program.
  • the plaintext video program is encrypted in segments, and the seed value generator 62 generates a distinct seed value 64 for each segment number 66. Each segment seed value 64 is essentially a distinct key for use in encrypting a corresponding segment of the plaintext video program.
  • the plaintext key 18 comprises a plurality of segment keys for encrypting each segment of the plaintext video program, and the seed value generator 62 generates a corresponding seed value 64 for each segment key.
  • the segment keys are computed from the plaintext key 18, and the seed value generator 62 generates a corresponding seed value 64 for each computed segment key.
  • the seed value generator 62 comprises a function f(x,y) for computing the segment seed values 64 wherein the plaintext key 18 and segment number 66 are the input arguments x and y, and the segment seed value 64 is the result.
  • Lookup tables may also be employed for generating the segment keys, and the algorithm for computing the segment keys may be programmably updated to facilitate different DVR manufactures and to protect against system compromise as described above.
  • FIG. 4C shows an alternative embodiment of the present invention as comprising a programmable LFSR 68 for generating a pseudo-random sequence 22 used to encode a plaintext video program into an encrypted video program 8 stored on the HDD 6.
  • a coefficient value generator 70 generates a coefficient values 72 used to initialize the coefficients of the LFSR 68.
  • the coefficient values 72 are generated from the plaintext key 18 used to encrypt the plaintext video program.
  • the plaintext video program is encrypted in segments, and the coefficient value generator 70 generates distinct coefficient values 72 for each segment number 66. Similar to the embodiment of FIG.
  • each set of coefficient values 72 is essentially a distinct key for use in encrypting a corresponding segment of the plaintext video program so that compromise of a single key enables successful decrypting of only a segment of the encrypted video program. Further, decrypting the video program in segments facilitates trick play features during playback as described above.
  • the plaintext key 18 comprises a plurality of segment keys for encrypting each segment of the plaintext video program, and the coefficient value generator 70 generates a set of coefficient values 72 for each segment key.
  • the segment keys are computed from the plaintext key 18, and the coefficient value generator 70 generates a corresponding set of coefficient values 72 for each computed segment key.
  • the coefficient value generator 70 comprises a function f(x,y) for computing the segment coefficient values 72 wherein the plaintext key 18 and segment number 66 are the input arguments x and y, and the segment coefficient values 72 are the result.
  • Lookup tables may also be employed for generating the segment keys, and the algorithm for computing the segment keys may be programmably updated to facilitate different DVR manufactures and to protect against system compromise as described above.
  • the LFSR 60 of FIG. 4B or the LFSR 68 of FIG. 4C is used to decrypt an encrypted video program 8 in segments using the segment keys.
  • the plaintext key 18 comprises a plurality of segment keys which are encrypted and stored as an encrypted file system entry 10 for use in decrypting the encrypted video program 8 during playback.
  • the plaintext key 18 is encrypted and stored as an encrypted file system entry 10. During playback, the encrypted key is decrypted into the plaintext key 18, and the plaintext key 18 is used to generate the segment keys for use in decrypting the encrypted video program 8 in segments.
  • the HDD 6 comprises a disk having a plurality of data tracks, where each data track comprises a plurality of data sectors.
  • a segment of a video program corresponds to a data sector. This simplifies the design since data is typically written to and read from a conventional HDD 6 in sector blocks.
  • the encrypted key for use in decrypting a corresponding sector is stored in the sector.
  • the unique ID 4 is implemented using tamper and inspection resistant circuitry to protect against discovery.
  • the host circuitry 12 and unique ID 4 are implemented within an integrated circuit (IC), and the unique ID 4 is buried, scattered or otherwise concealed within the IC using any suitable method.
  • at least part of the cryptography facility 14 e.g., the seed value generator 62 of FIG. 4B or the coefficient value generator 70 of FIG. 4C
  • An example of tamper and inspection resistant circuitry is disclosed in Tygar, J.D. and Yee, B.S.,
  • the embodiments of the present invention may be implemented in circuitry or software or both.
  • the circuitry and/or software may be static or field programmable as described above.
  • Software embodiments comprise code segments embodied on a computer readable medium, such as a hard disk, floppy disk, compact disk (CD), digital video disk (DVD), or programmable memory (e.g., an EEPROM).
  • the code segments may be embodied on the computer readable medium in any suitable form, such as source code segments, assembly code segments, or executable code segments.

Abstract

A digital video recorder (DVR) (1) is disclosed for storing a plain text video program as an encrypted video program. The DVR (1) comprises a random access storage (RAS) (3) device for storing the encrypted video program in encrypted segments. The DVR (1) further comprises a cryptography facility comprising an encoder (24) for encrypting plaintext segments of the plaintext video program into the encrypted segments stored on the RAS (3) device, and a decoder (26) for randomly and independently decrypting the encrypted segments of the encrypted video program into plaintext segments during playback.

Description

DIGITAL VIDEO RECORDER FOR ENCRYPTING/DECRYPTING VIDEO PROGRAMS
BACKGROUND OF THE INVENTION Field of the Invention
The present invention relates to digital video recorders. More particularly, the present invention relates to a digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features. Description of the Prior Art Digital video recorders (DVRs) typically store video programs on a random access storage (RAS) device, such as on a conventional hard disk drive (HDD), which enables certain "trick play" features, such as skipping ahead in a program. The trick play features are enabled by processing frame headers which are recorded in arbitrary length frames of the video program. Due to the arbitrary frame lengths, the video programs are typically processed in unencrypted form in order to detect frame headers which identify frame boundaries. Thus, prior art DVRs typically store copyrighted video programs in unencrypted form so that the DVR can randomly access individual frames during playback. This design, however, subjects the copyrighted material to unauthorized reproduction, for example, by eavesdropping while the copyrighted content is transferred from the DVR host circuitry to the RAS device. Prior art DVRs typically employ a conventional hard disk drive (HDD), such as an IDE hard disk drive, as the RAS device since HDDs have sufficient capacity to store video content and are relatively inexpensive due to their prevalent use in personal computers (PCs). Rather than design and manufacture a customized HDD for the DVR market, DVRs are constructed similar to a PC, including DVR host circuitry for interfacing with a commodity HDD which reduces the cost of the DVR. Using a conventional HDD, however, has rendered the DVR more susceptible to unauthorized copying of video programs since the HDD can be removed and installed in another DVR or in a PC.
There is, therefore, a need to protect against unauthorized reproduction of copyrighted video programs in a DVR employing a cost effective, commodity HDD, while supporting trick play features. SUMMARY OF THE INVENTION
The present invention may be regarded as a digital video recorder (DVR) for storing a plaintext video program as an encrypted video program. The DVR comprises a random access storage (RAS) device for storing the encrypted video program in encrypted segments. The DVR further comprises a cryptography facility comprising an encoder for encrypting plaintext segments of the plaintext video program into the encrypted segments stored on the RAS device, and a decoder for randomly and independently decrypting the encrypted segments of the encrypted video program into plaintext segments during playback.
In one embodiment the cryptography facility comprises a pseudo-random sequence generator for generating a pseudo-random sequence. In one embodiment, the pseudo-random sequence generator is initialized with segment seed values corresponding to the plaintext segments of the plaintext video program , and the encoder combines the pseudo-random sequence generated for each segment seed value with the plaintext segments of the plaintext video program to generate the encrypted segments of the encrypted video program stored on the RAS device. During playback, the pseudo-random sequence generator is initialized with segment seed values corresponding to the encrypted segments of the encrypted video program, and the decoder combines the pseudo-random sequence generated for each segment seed value with the encrypted segments of the encrypted video program to generate the plaintext segments of the plaintext video program. In an alternative embodiment, the RAS device comprises a hard disk drive (HDD) comprising a disk, the disk comprises a plurality of data tracks, each track comprises a plurality of data sectors, and each data sector stores an encrypted segment of the encrypted video program.
The present invention may also be regarded as a method for processing a video program in a digital video recorder comprising a random access storage (RAS) device. Plaintext segments of a plaintext video program are encrypted into encrypted segments. The encrypted segments are stored on the RAS device and, during playback, randomly read from the RAS device. Each encrypted segment is then independently decrypted into a plaintext segment. BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a digital video recorder according to an embodiment of the present invention wherein a video program is encrypted in segments, and the encrypted segments stored on a random access storage device.
FIG. 2 shows a digital video recorder according to an alternative embodiment of the present invention wherein video programs are stored in encrypted form on a hard disk drive (HDD) using plaintext keys which are also encrypted using a pseudo-random sequence generated from a unique ID and stored in encrypted file system entries on the HDD.
FIG. 3 A shows a programmable file system (FS) polynomial implemented using a linear feedback shift register (LFSR) for generating the pseudo-random sequence of FIG. 2, wherein a seed value is generated for the LFSR from the unique ID. FIG. 3B shows a programmable FS polynomial implemented using a LFSR for generating the pseudo-random sequence of FIG. 2, wherein coefficient values are generated for the LFSR from the unique ID.
FIG. 4A shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key as a seed value for the LFSR FIG. 4B shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key, wherein a seed value is generated from the plaintext key. In an alternative embodiment, a plurality of segment seed values are generated from the plaintext key wherein each segment seed value is used to encrypt a corresponding segment of the plaintext video program. FIG. 4C shows an LFSR for generating a pseudo-random sequence for encrypting a plaintext video program using a plaintext key, wherein coefficient values are generated from the plaintext key. In an alternative embodiment, sets of coefficient values are generated from the plaintext key wherein each set of coefficient values is used to encrypt a corresponding segment of the plaintext video program. DESCRIPTION OF THE PREFERRED EMBODIMENTS
FIG. 1 shows a digital video recorder (DVR) 1 for storing a plaintext video program as an encrypted video program according to an embodiment of the present invention. The DVR 1 comprises a random access storage (RAS) device 3 for storing the encrypted video program in encrypted segments 5. The DVR 1 further comprises a cryptography facility 14 comprising an encoder 24 for encrypting plaintext segments 7A of the plaintext video program into the encrypted segments 5 stored on the RAS device 3, and a decoder 26 for randomly and independently decrypting the encrypted segments 5 of the encrypted video program into plaintext segments 7B during playback.
The DVR 1 of FIG. 1 further comprises a video controller 28 for receiving video data 30 from an external entity (e.g., a cable or satellite) and for providing video data 34 to a display device during playback. The video controller 28 processes the headers in the video frames of the video data 30 in order to implement trick play features. Certain trick play features, such as skip ahead or behind, require that the video program be accessed randomly rather than in a consecutive sequence of frames. The DVR 1 of FIG. 1 facilitates this feature by decrypting the video program in segments. When the video controller 28 requires access to a particular segment of the video program, it initializes the decoder 26 with an appropriate segment key for decrypting the video segment as it is read from the RAS device 3.
FIG. 2 shows a DVR 2 according to an embodiment of the present invention wherein the RAS device 3 of FIG. 1 is implemented as a hard disk drive (HDD) 6. The HDD 6 stores a plurality of encrypted video programs 8 and an encrypted file system, the encrypted file system comprising a plurality of encrypted file system entries 10 for decrypting the plurality of encrypted video programs 8. The DVR 2 further comprises host circuitry 12 for interfacing with the HDD 6, the host circuitry 12 comprising the cryptography facility 14 for encrypting plaintext file system entries 16A into the encrypted file system entries 10 stored on the HDD 6, and for decrypting the encrypted file system entries 10 read from the HDD 6 into plaintext file system entries 16B. The cryptography facility 14 comprises a pseudo-random sequence generator 20, responsive to the unique ID 4, for generating a pseudo-random sequence 22. The cryptography facility 14 further comprises an encoder 24 for combining the pseudorandom sequence 22 with the plaintext file system entries 16A to generate the encrypted file system entries 10 stored on the HDD 6, and a decoder 26 for combining the pseudo-random sequence 22 with the encrypted file system entries 10 read from the HDD 6 to generate the plaintext file system entries 16B.
In one embodiment, the encoder 24 of FIG. 2 performs the encryption operation by XORing each element (e.g., byte) of the plaintext file system entry 16A with a corresponding element (e.g., byte) of the pseudo-random sequence 22. Similarly, the decoder 26 performs the decryption operation by XORing each element (e.g., byte) of the encrypted file system entry 10 with a corresponding element (e.g., byte) of the pseudo-random sequence 22 to generate the plaintext file system entry 16B.
The video controller 28 generates control signals 32 for controlling the operation of the cryptography facility 14 when recording an encrypted video program 8, together with the encrypted file system entry 10 for decrypting the encrypted video program 8. The video controller also processes the decrypted file system entries 16B so that the encrypted video programs 8 can be decrypted and output as video data 34 to a display device. Because the file system entries 10 are stored in encrypted form relative to the unique ID 4 assigned to the DVR 2, the encrypted video programs 8 stored on the HDD 6 cannot be decrypted by connecting the HDD 6 to another DVR or to a PC. In effect, the HDD 6 is married to the host circuitry 12 of the DVR 2 through the unique ID 4 which protects against unauthorized copying. In addition, the encrypted file system entries 10 are transparent to the operation of the HDD 6 so that any conventional HDD 6 may be employed without modification.
In one embodiment, the plaintext file system entry 16A comprises a plaintext key for encrypting a plaintext video program into an encrypted video program 8 stored on the HDD 6. The cryptography facility 14 encrypts the plaintext video program into an encrypted video program 8 stored on the HDD 6, and encrypts the plaintext key into an encrypted key stored on the HDD 6 in an encrypted file system entry 10. In one embodiment, the encoder 24 combines the pseudo-random sequence 22 with the plaintext video program to generate the encrypted video program 8 stored on the HDD 6. In another embodiment, the encrypted file system entry 10 comprises an encrypted key for decrypting an encrypted video program 8 read from the HDD 6 into a plaintext video program. The cryptography facility 14 decrypts the encrypted key read from encrypted file system entry 10 into a plaintext key, and decrypts the encrypted video program 8 read from the HDD 6 using the plaintext key. In one embodiment, the decoder 26 combines the pseudo- random sequence 22 with the encrypted video program 8 read from the HDD 6 to generate the plaintext video program.
In one embodiment, the pseudo-random sequence generator 20 comprises a programmable file system (FS) polynomial for generating the pseudo-random sequence 22. In one embodiment, the programmable FS polynomial is programmed with coefficients which, in one embodiment, are generated by a coefficient generator responsive to the unique ID 4. In another embodiment, the programmable FS polynomial is programmed with a seed value which, in one embodiment, is generated by a seed value generator responsive to the unique ID 4.
FIG. 3 A shows an embodiment of the present invention wherein the FS polynomial is implemented using a suitable linear feedback register (LFSR) 36. An LFSR may be implemented using a number of different configurations. The LFSR 36 of FIG. 3 A comprises a shift register 38 comprising N storage elements which are initialized with a seed value 40 generated by a seed value generator 50 from the unique ID 4. A number of taps 42A-42E connect a corresponding number of the storage elements to an adder 44 for adding the values stored in the storage elements. The resulting sum 44 is fed back 46 to an input of the LFSR 36. The LFSR 36 is shifted from left to right, and the right most storage element 48 outputs each value of the pseudo-random sequence 22.
FIG. 3B shows an alternative embodiment of the present invention wherein the FS polynomial is implemented using an LFSR 52 comprising programmable coefficients 540-54N* A coefficient generator 56 generates coefficient values 58 for programming each of the programmable coefficients 540-54N. In the embodiment shown in FIG. 3B, the coefficients are binary valued and the programmable coefficients 540-54N are implemented as switches.
In yet another embodiment of the present invention, the FS polynomial is implemented using an LFSR comprising both a programmable seed value and programmable coefficients values which are generated from the unique ID 4. In one embodiment, the seed value generator 50 implements a function f(x), such as a polynomial, with the unique ID 4 as the input argument x and the seed value 40 the result. In another embodiment, the seed value generator 50 comprises a programmable algorithm for computing the seed value 40 from the unique ED 4. This embodiment allows a DVR manufacture to select the function f(x) for implementing a line of DVRs. This embodiment also allows an external entity to update the programmable algorithm to protect against system compromise. For example, in one embodiment the DVR 2 of FIG. 2 comprises network circuitry for connecting to a network (e.g., through a cable or satellite), and a system administrator on the network periodically changes the programmable algorithm in a random manner. Thus, if an attacker discovers the algorithm used by the seed value generator 50 to generate the seed value 40, the compromise is only temporary until the system administrator updates the algorithm. In another embodiment, the coefficient value generator 56 implements a plurality of functions f(x), such as a plurality of polynomials, with the unique ID as the input argument x and the coefficient values 58 the result of each function f(x). The coefficient value generator 56 may also implement a programmable algorithm for computing the coefficient values 58 to facilitate different DVR manufactures and to protect against system compromise as described above.
In another embodiment of the present invention, the seed value generator 50 comprises a seed table comprising a plurality of table entries, each table entry comprising a seed value. An index generator, responsive to the unique ID 4, generates an index into the seed table. In yet another embodiment, the coefficient value generator 56 comprises a coefficient table comprising a plurality of table entries, each table entry comprising coefficient values. An index generator, responsive to the unique ID 4, generates an index into the coefficient table.
FIG. 4A shows an alternative embodiment of the present invention as comprising a programmable LFSR 59 for generating a pseudo-random sequence 22 used to encrypt a plaintext video program into an encrypted video program 8 stored on the HDD 6. A plaintext key 18 is used as a seed value for the LFSR 59, where the plaintext key 18 is associated with the plaintext video program. In one embodiment, the plaintext key is derived from the filename or other attribute of the video program. In another embodiment, the plaintext key is generated randomly using any suitable method, for example, by reading a system clock value just prior to encrypting the plaintext video.
FIG. 4B shows an alternative embodiment of the present invention as comprising a programmable LFSR 60 for generating a pseudo-random sequence 22 used to encrypt a plaintext video program into an encrypted video program 8 stored on the HDD 6. A seed value generator 62 generates a seed value 64 used to initialize the shift register 38. The seed value 64 is generated from the plaintext key 18 used to encrypt the plaintext video program. In one embodiment, the plaintext video program is encrypted in segments, and the seed value generator 62 generates a distinct seed value 64 for each segment number 66. Each segment seed value 64 is essentially a distinct key for use in encrypting a corresponding segment of the plaintext video program. In this manner, compromise of a single key enables successful decrypting of only a segment of the encrypted video program. Further, encrypting the video program in segments facilitates trick play .features during playback as described above. In one embodiment, the plaintext key 18 comprises a plurality of segment keys for encrypting each segment of the plaintext video program, and the seed value generator 62 generates a corresponding seed value 64 for each segment key. In another embodiment, the segment keys are computed from the plaintext key 18, and the seed value generator 62 generates a corresponding seed value 64 for each computed segment key. In one embodiment, the seed value generator 62 comprises a function f(x,y) for computing the segment seed values 64 wherein the plaintext key 18 and segment number 66 are the input arguments x and y, and the segment seed value 64 is the result. Lookup tables may also be employed for generating the segment keys, and the algorithm for computing the segment keys may be programmably updated to facilitate different DVR manufactures and to protect against system compromise as described above.
FIG. 4C shows an alternative embodiment of the present invention as comprising a programmable LFSR 68 for generating a pseudo-random sequence 22 used to encode a plaintext video program into an encrypted video program 8 stored on the HDD 6. A coefficient value generator 70 generates a coefficient values 72 used to initialize the coefficients of the LFSR 68. The coefficient values 72 are generated from the plaintext key 18 used to encrypt the plaintext video program. In one embodiment, the plaintext video program is encrypted in segments, and the coefficient value generator 70 generates distinct coefficient values 72 for each segment number 66. Similar to the embodiment of FIG. 4B, each set of coefficient values 72 is essentially a distinct key for use in encrypting a corresponding segment of the plaintext video program so that compromise of a single key enables successful decrypting of only a segment of the encrypted video program. Further, decrypting the video program in segments facilitates trick play features during playback as described above.
In one embodiment, the plaintext key 18 comprises a plurality of segment keys for encrypting each segment of the plaintext video program, and the coefficient value generator 70 generates a set of coefficient values 72 for each segment key. In another embodiment, the segment keys are computed from the plaintext key 18, and the coefficient value generator 70 generates a corresponding set of coefficient values 72 for each computed segment key. In one embodiment, the coefficient value generator 70 comprises a function f(x,y) for computing the segment coefficient values 72 wherein the plaintext key 18 and segment number 66 are the input arguments x and y, and the segment coefficient values 72 are the result. Lookup tables may also be employed for generating the segment keys, and the algorithm for computing the segment keys may be programmably updated to facilitate different DVR manufactures and to protect against system compromise as described above.
In another embodiment, the LFSR 60 of FIG. 4B or the LFSR 68 of FIG. 4C is used to decrypt an encrypted video program 8 in segments using the segment keys. In one embodiment, the plaintext key 18 comprises a plurality of segment keys which are encrypted and stored as an encrypted file system entry 10 for use in decrypting the encrypted video program 8 during playback. In another embodiment, the plaintext key 18 is encrypted and stored as an encrypted file system entry 10. During playback, the encrypted key is decrypted into the plaintext key 18, and the plaintext key 18 is used to generate the segment keys for use in decrypting the encrypted video program 8 in segments.
In one embodiment, the HDD 6 comprises a disk having a plurality of data tracks, where each data track comprises a plurality of data sectors. In the embodiments of FIG. 4B and 4C, a segment of a video program corresponds to a data sector. This simplifies the design since data is typically written to and read from a conventional HDD 6 in sector blocks. In one embodiment, the encrypted key for use in decrypting a corresponding sector is stored in the sector.
In another embodiment of the present invention, the unique ID 4 is implemented using tamper and inspection resistant circuitry to protect against discovery. In one embodiment, the host circuitry 12 and unique ID 4 are implemented within an integrated circuit (IC), and the unique ID 4 is buried, scattered or otherwise concealed within the IC using any suitable method. In yet another embodiment, at least part of the cryptography facility 14 (e.g., the seed value generator 62 of FIG. 4B or the coefficient value generator 70 of FIG. 4C) is implemented using tamper and inspection resistant circuitry to protect against discovery. An example of tamper and inspection resistant circuitry is disclosed in Tygar, J.D. and Yee, B.S.,
"Secure Coprocessors in Electronic Commerce Applications," Proceedings 1995 USENIX
Electronic Commerce Workshop, 1995, New York, which is incorporated herein by reference.
The embodiments of the present invention may be implemented in circuitry or software or both. The circuitry and/or software may be static or field programmable as described above. Software embodiments comprise code segments embodied on a computer readable medium, such as a hard disk, floppy disk, compact disk (CD), digital video disk (DVD), or programmable memory (e.g., an EEPROM). The code segments may be embodied on the computer readable medium in any suitable form, such as source code segments, assembly code segments, or executable code segments.

Claims

WE CLAIM: 1. A digital video recorder for storing a plaintext video program as an encrypted video program, the digital video recorder comprising: (a) a random access storage (RAS) device for storing the encrypted video program in encrypted segments; (b) a cryptography facility comprising: an encoder for encrypting plaintext segments of the plaintext video program into the encrypted segments stored on the RAS device; and a decoder for randomly and independently decrypting each encrypted segment of the encrypted video program into a plaintext segment during playback.
2. The digital video recorder as recited in claim 1, wherein the cryptography facility further comprises a pseudo-random sequence generator for generating a pseudo- random sequence.
3. The digital video recorder as recited in claim 2, wherein: (a) the pseudo-random sequence generator is initialized with segment seed values corresponding to the plaintext segments of the plaintext video program; and (b) the encoder combines the pseudo-random sequence generated for each segment seed value with the plaintext segments of the plaintext video program to generate the encrypted segments of the encrypted video program stored on the RAS device.
4. The digital video recorder as recited in claim 2, wherein: (a) the pseudo-random sequence generator is initialized with segment seed values corresponding to the encrypted segments of the encrypted video program; and (b) the decoder combines the pseudo-random sequence generated for each segment seed value with the encrypted segments of the encrypted video program to generate the plaintext segments of the plaintext video program during playback.
5. The digital video recorder as recited in claim 2, wherein: (a) the pseudo-random sequence generator comprises a linear feedback shift register (LFSR); and (b) the LFSR is initialized with segment seed values corresponding to the plaintext segments of the plaintext video program during encoding, and with segment seed values corresponding to the encrypted segments of the encrypted video program during decoding.
6. The digital video recorder as recited in claim 5, further comprising a seed value generator for generating the segment seed values from an initial value.
7. The digital video recorder as recited in claim 1, wherein: (a) the RAS device comprises a hard disk drive (HDD) comprising a disk; (b) the disk comprises a plurality of data tracks; (c) each track comprises a plurality of data sectors; and (d) each data sector stores an encrypted segment of the encrypted video program.
8. A method for processing a video program in a digital video recorder comprising a random access storage (RAS) device, the method comprising the steps of: (a) encrypting plaintext segments of a plaintext video program into encrypted segments; (b) storing the encrypted segments on the RAS device; (c) randomly reading the encrypted segments from the RAS device; and (d) independently decrypting each encrypted segment into a plaintext segment.
9. The method for processing a video program as recited in claim 8, further comprising the step of generating a pseudo-random sequence using a pseudo-random sequence generator.
10. The method for processing a video program as recited in claim 9, further comprising the steps of: (a) initializing the pseudo-random sequence generator with segment seed values corresponding to the plaintext segments of the plaintext video program; and (b) combining the pseudo-random sequence generated for each segment seed value with the plaintext segments of the plaintext video program to generate the encrypted segments of the encrypted video program stored on the RAS device.
11. The method for processing a video program as recited in claim 9, further comprising the step of: (a) initializing the pseudo-random sequence generator with segment seed values corresponding to the encrypted segments of the encrypted video program; and (b) combining the pseudo-random sequence generated for each segment seed value with the encrypted segments of the encrypted video program to generate the plaintext segments of the plaintext video program.
12. The method for processing a video program as recited in claim 9, wherein: (a) the pseudo-random sequence generator comprises a linear feedback shift register (LFSR); and (b) the LFSR is initialized with segment seed values corresponding to the plaintext segments of the plaintext video program during encoding, and with segment seed values corresponding to the encrypted segments of the encrypted video program during decoding.
13. The method for processing a video program as recited in claim 12, further comprising the step of generating the segment seed values from an initial value.
14. The method for processing a video program as recited in claim 8, wherein: (a) the RAS device comprises a hard disk drive (HDD) comprising a disk; (b) the disk comprises a plurality of data tracks; (c) each track comprises a plurality of data sectors; and each data sector stores an encrypted segment of the encrypted video program.
PCT/US2001/042226 2000-09-30 2001-09-18 Digital video recorder for encrypting/decrypting video programs WO2002029566A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001293289A AU2001293289A1 (en) 2000-09-30 2001-09-18 Digital video recorder for encrypting/decrypting video programs

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/676,637 US6851055B1 (en) 2000-09-30 2000-09-30 Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features
US09/676,637 2000-09-30

Publications (1)

Publication Number Publication Date
WO2002029566A1 true WO2002029566A1 (en) 2002-04-11

Family

ID=24715325

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/042226 WO2002029566A1 (en) 2000-09-30 2001-09-18 Digital video recorder for encrypting/decrypting video programs

Country Status (3)

Country Link
US (1) US6851055B1 (en)
AU (1) AU2001293289A1 (en)
WO (1) WO2002029566A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004081744A2 (en) * 2003-03-11 2004-09-23 Thomson Licensing S.A. Content protection for digital recording
WO2006062953A2 (en) 2004-12-08 2006-06-15 James William Fahrny Method and system for securing content in media systems

Families Citing this family (134)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6701528B1 (en) * 2000-01-26 2004-03-02 Hughes Electronics Corporation Virtual video on demand using multiple encrypted video segments
US6729210B2 (en) * 2001-06-28 2004-05-04 John L. Morris Driver for eyebolts and hooks
US7073070B2 (en) * 2001-06-29 2006-07-04 Intel Corporation Method and apparatus to improve the protection of information presented by a computer
US8079045B2 (en) 2001-10-17 2011-12-13 Keen Personal Media, Inc. Personal video recorder and method for inserting a stored advertisement into a displayed broadcast stream
US7418599B2 (en) * 2002-06-03 2008-08-26 International Business Machines Corporation Deterring theft of media recording devices by encrypting recorded media files
US7209561B1 (en) * 2002-07-19 2007-04-24 Cybersource Corporation System and method for generating encryption seed values
US20050086321A1 (en) * 2003-10-21 2005-04-21 Folk Robert H.Ii Apparatus and method for providing a virtual common hard disk recorder resource
US7801303B2 (en) * 2004-03-01 2010-09-21 The Directv Group, Inc. Video on demand in a broadcast network
US9225761B2 (en) * 2006-08-04 2015-12-29 The Directv Group, Inc. Distributed media-aggregation systems and methods to operate the same
US9178693B2 (en) * 2006-08-04 2015-11-03 The Directv Group, Inc. Distributed media-protection systems and methods to operate the same
US20090113702A1 (en) 2007-11-01 2009-05-07 Western Digital Technologies, Inc. Disk drive comprising a double sided flex circuit wherein a first side lead provides an etching mask for a second side lead
US9009358B1 (en) 2008-09-23 2015-04-14 Western Digital Technologies, Inc. Configuring a data storage device with a parameter file interlocked with configuration code
US8914625B1 (en) 2009-07-31 2014-12-16 Western Digital Technologies, Inc. Automatically configuring a web browser file when booting an operating system from a data storage device
US8687306B1 (en) 2010-03-22 2014-04-01 Western Digital Technologies, Inc. Systems and methods for improving sequential data rate performance using sorted data zones
US9330715B1 (en) 2010-03-22 2016-05-03 Western Digital Technologies, Inc. Mapping of shingled magnetic recording media
US9268499B1 (en) 2010-08-13 2016-02-23 Western Digital Technologies, Inc. Hybrid drive migrating high workload data from disk to non-volatile semiconductor memory
US8879188B1 (en) 2010-08-23 2014-11-04 Western Digital Technologies, Inc. Disk drive employing fly height calibration tracks to account for magnetic entropy and thermal decay
US8954664B1 (en) 2010-10-01 2015-02-10 Western Digital Technologies, Inc. Writing metadata files on a disk
US9258587B2 (en) * 2011-01-05 2016-02-09 Verizon Patent And Licensing Inc. Content blackout determinations for playback of video streams on portable devices
US9268649B1 (en) 2011-06-23 2016-02-23 Western Digital Technologies, Inc. Disk drive with recent write streams list for data refresh determination
US8990493B1 (en) 2011-06-30 2015-03-24 Western Digital Technologies, Inc. Method and apparatus for performing force unit access writes on a disk
US9189392B1 (en) 2011-06-30 2015-11-17 Western Digital Technologies, Inc. Opportunistic defragmentation during garbage collection
US8909889B1 (en) 2011-10-10 2014-12-09 Western Digital Technologies, Inc. Method and apparatus for servicing host commands by a disk drive
US9158722B1 (en) 2011-11-02 2015-10-13 Western Digital Technologies, Inc. Data storage device to communicate with a host in a SATA or a USB mode
US9213493B1 (en) 2011-12-16 2015-12-15 Western Digital Technologies, Inc. Sorted serpentine mapping for storage drives
US8996839B1 (en) 2012-01-23 2015-03-31 Western Digital Technologies, Inc. Data storage device aligning partition to boundary of sector when partition offset correlates with offset of write commands
US9063838B1 (en) 2012-01-23 2015-06-23 Western Digital Technologies, Inc. Data storage device shifting data chunks of alignment zone relative to sector boundaries
US8749910B1 (en) 2012-05-07 2014-06-10 Western Digital Technologies, Inc. Hard disk drive assembly including a NVSM to store configuration data for controlling disk drive operations
US8681442B2 (en) 2012-05-11 2014-03-25 Western Digital Technologies, Inc. Disk drive comprising extended range head proximity sensor
US9128820B1 (en) 2012-06-18 2015-09-08 Western Digital Technologies, Inc. File management among different zones of storage media
US9383923B1 (en) 2012-10-18 2016-07-05 Western Digital Technologies, Inc. Write pointer management for a disk drive
US8970978B1 (en) 2012-10-22 2015-03-03 Western Digital Technologies, Inc. Disk drive detecting head touchdown by applying DC+AC control signal to fly height actuator
US8959281B1 (en) 2012-11-09 2015-02-17 Western Digital Technologies, Inc. Data management for a storage device
US8902529B1 (en) 2012-11-20 2014-12-02 Western Digital Technologies, Inc. Dual frequency crystal oscillator
US8941941B1 (en) 2013-02-28 2015-01-27 Western Digital Technologies, Inc. Disk drive calibrating touchdown sensor
US8891341B1 (en) 2013-03-11 2014-11-18 Western Digital Technologies, Inc. Energy assisted magnetic recording disk drive using modulated laser light
US9417628B2 (en) 2013-03-13 2016-08-16 Western Digital Technologies, Inc. Production failure analysis system
US9074941B1 (en) 2013-03-14 2015-07-07 Western Digital Technologies, Inc. Systems and methods for measuring ambient and laser temperature in heat assisted magnetic recording
US9053749B1 (en) 2013-03-15 2015-06-09 Western Digital Technologies, Inc. Disk drive comprising a per-drive and per-head fly height filter
US8922939B1 (en) 2013-04-02 2014-12-30 Western Digital Technologies, Inc. Disk drive generating feed-forward fly height control based on temperature sensitive fly height sensor
US9064542B1 (en) 2013-04-08 2015-06-23 Western Digital Technologies, Inc. Scheduled load of heads to reduce lubricant migration on pole tip and decrease time to ready
US8949521B1 (en) 2013-04-10 2015-02-03 Western Digital Technologies, Inc. Actuator prepositioning for disk drive
US8947816B1 (en) 2013-05-01 2015-02-03 Western Digital Technologies, Inc. Data storage assembly for archive cold storage
US8891193B1 (en) 2013-05-09 2014-11-18 Western Digital Technologies, Inc. Disk drive calibrating threshold and gain of touchdown sensor
US9153287B1 (en) 2013-05-13 2015-10-06 Western Digital Technologies, Inc. Data access for shingled magnetic recording media
US9183864B1 (en) 2013-06-13 2015-11-10 Western Digital Technologies, Inc. Disk drive adjusting closed-loop fly height target based on change in open-loop fly height control signal
US9164694B1 (en) 2013-06-19 2015-10-20 Western Digital Technologies, Inc. Data storage device detecting read-before-write conditions and returning configurable return data
US9025270B1 (en) 2013-09-17 2015-05-05 Western Digital Technologies, Inc. Electronic system with current conservation mechanism and method of operation thereof
US9355666B1 (en) 2013-09-30 2016-05-31 Western Digital Technologies, Inc. Disk drive measuring stroke difference between heads by detecting a difference between ramp contact
US9099144B1 (en) 2013-10-11 2015-08-04 Western Digital Technologies, Inc. Disk drive evaluating laser performance for heat assisted magnetic recording
US9047917B1 (en) 2013-11-26 2015-06-02 Western Digital Technologies, Inc. Disk drive slider with sense amplifier for coupling to a preamp through a supply/bias line and a read signal line
US9064525B2 (en) 2013-11-26 2015-06-23 Western Digital Technologies, Inc. Disk drive comprising laser transmission line optimized for heat assisted magnetic recording
US9257145B1 (en) 2013-11-27 2016-02-09 Western Digital Technologies, Inc. Disk drive measuring down-track spacing of read sensors
US9013818B1 (en) 2013-12-06 2015-04-21 Western Digital Technologies, Inc. Disk drive measuring reader/writer gap by measuring fractional clock cycle over disk radius
US9021410B1 (en) 2013-12-10 2015-04-28 Western Technologies, Inc. Electronic system with multi-cycle simulation coverage mechanism and method of operation thereof
US8958167B1 (en) 2013-12-23 2015-02-17 Western Digital Technologies, Inc. Detection of disk surface irregularities in data storage devices
US8908311B1 (en) 2014-01-27 2014-12-09 Western Digital Technologies, Inc. Data storage device writing a multi-sector codeword in segments over multiple disk revolutions
US9864529B1 (en) 2014-01-27 2018-01-09 Western Digital Technologies, Inc. Host compatibility for host managed storage media
US9501393B2 (en) 2014-01-27 2016-11-22 Western Digital Technologies, Inc. Data storage system garbage collection based on at least one attribute
US9064504B1 (en) 2014-01-29 2015-06-23 Western Digital Technologies, Inc. Electronic system with media recovery mechanism and method of operation thereof
US9230585B1 (en) 2014-01-31 2016-01-05 Western Digital Technologies, Inc. Per wedge preheat DFH to improve data storage device performance
US9257146B1 (en) 2014-02-11 2016-02-09 Western Digital Technologies, Inc. Data storage device comprising sequence detector compensating for inter-track interference
US8988809B1 (en) 2014-02-18 2015-03-24 Western Digital (Fremont), Llc Disk recording device for writing a radially coherent reference band by measuring relative timing offsets of reference bursts
US9117489B1 (en) 2014-02-18 2015-08-25 Western Digital Technologies, Inc. Data storage device screening heads by verifying defects after defect scan
US9245556B2 (en) 2014-03-10 2016-01-26 Western Digital Technologies, Inc. Disk drive employing multiple read elements to increase radial band for two-dimensional magnetic recording
US9070406B1 (en) 2014-03-10 2015-06-30 Western Digital Technologies, Inc. Disk drive configuring one-dimensional and two-dimensional recording areas based on read element spacing
US9082458B1 (en) 2014-03-10 2015-07-14 Western Digital Technologies, Inc. Data storage device balancing and maximizing quality metric when configuring arial density of each disk surface
US9263088B2 (en) 2014-03-21 2016-02-16 Western Digital Technologies, Inc. Data management for a data storage device using a last resort zone
US8947812B1 (en) 2014-03-27 2015-02-03 Western Digital Technologies, Inc. Data storage device comprising equalizer filter and inter-track interference filter
US9916616B2 (en) 2014-03-31 2018-03-13 Western Digital Technologies, Inc. Inventory management system using incremental capacity formats
US9645752B1 (en) 2014-04-07 2017-05-09 Western Digital Technologies, Inc. Identification of data committed to non-volatile memory by use of notification commands
US9632711B1 (en) 2014-04-07 2017-04-25 Western Digital Technologies, Inc. Processing flush requests by utilizing storage system write notifications
US9123370B1 (en) 2014-04-15 2015-09-01 Western Digital Technologies, Inc. Data storage device calibrating fly height actuator based on laser power for heat assisted magnetic recording
US8976633B1 (en) 2014-04-15 2015-03-10 Western Digital Technologies, Inc. Data storage device calibrating fly height actuator based on laser power for heat assisted magnetic recording
US8988810B1 (en) 2014-04-16 2015-03-24 Western Digital Technologies, Inc. Track measurement for data storage device
US9401165B1 (en) 2014-05-05 2016-07-26 Western Digital Technologies, Inc. Method and system to monitor magnetic head loading and unloading stability for a data storage system
US9245558B1 (en) 2014-05-09 2016-01-26 Western Digital Technologies, Inc. Electronic system with data management mechanism and method of operation thereof
US9075714B1 (en) 2014-05-13 2015-07-07 Western Digital Technologies, Inc. Electronic system with data management mechanism and method of operation thereof
US9251856B1 (en) 2014-05-30 2016-02-02 Western Digial Technologies, Inc. Read failover method and apparatus for a data storage system
US9251844B1 (en) 2014-06-02 2016-02-02 Western Digital Technologies, Inc. Waterfall method and apparatus for a data storage device read system
US9025267B1 (en) 2014-06-09 2015-05-05 Western Digital Technologies, Inc. Data storage device using branch metric from adjacent track to compensate for inter-track interference
US9013821B1 (en) 2014-06-10 2015-04-21 Western Digital Technologies, Inc. Data storage device employing one-dimensional and two-dimensional channels
US8953277B1 (en) 2014-06-16 2015-02-10 Western Digital Technologies, Inc. Data storage device writing tracks on a disk with equal spacing
US9171575B1 (en) 2014-06-23 2015-10-27 Western Digital Technologies, Inc. Data storage device detecting media defects by writing opposite polarity test pattern
US9117463B1 (en) 2014-06-23 2015-08-25 Western Digital Technologies, Inc. Data storage device erasing multiple adjacent data tracks to recover from inter-track interference
US9424864B2 (en) 2014-07-02 2016-08-23 Western Digital Technologies, Inc. Data management for a data storage device with zone relocation
US9001453B1 (en) 2014-07-18 2015-04-07 Western Digital Technologies, Inc. Data storage device calibrating fly height actuator based on read mode touchdown resistance of touchdown sensor
US8953269B1 (en) 2014-07-18 2015-02-10 Western Digital Technologies, Inc. Management of data objects in a data object zone
US9875055B1 (en) 2014-08-04 2018-01-23 Western Digital Technologies, Inc. Check-pointing of metadata
US9952950B1 (en) 2014-09-08 2018-04-24 Western Digital Technologies, Inc. Data management in RAID environment
US9153266B1 (en) 2014-09-11 2015-10-06 Western Digital Technologies, Inc. Data storage device measuring laser protrusion fly height profile
US9600205B1 (en) 2014-09-22 2017-03-21 Western Digital Technologies, Inc. Power aware power safe write buffer
US9117479B1 (en) 2014-09-24 2015-08-25 Western Digital Technologies, Inc. Data storage device calibrating laser write power for heat assisted magnetic recording
US9747928B1 (en) 2014-09-25 2017-08-29 Western Digital Technologies, Inc. Data storage device modifying write operation when a laser mode hop is detected
US9025421B1 (en) 2014-10-08 2015-05-05 Western Digital Technologies, Inc. Data storage device adjusting laser input power to compensate for temperature variations
US9236086B1 (en) 2014-10-15 2016-01-12 Western Digital Technologies, Inc. Methods for reducing operational latency of data storage systems
US9099103B1 (en) 2014-10-21 2015-08-04 Western Digital Technologies, Inc. Heat assisted magnetic recording withinterlaced high-power heated and low-power heated tracks
US9129628B1 (en) 2014-10-23 2015-09-08 Western Digital Technologies, Inc. Data management for data storage device with different track density regions
US9123382B1 (en) 2014-10-28 2015-09-01 Western Digital Technologies, Inc. Non-volatile caching for sequence of data
US9230605B1 (en) 2014-12-01 2016-01-05 Western Digital Technologies, Inc. Data storage device maximizing areal density based on a target quality metric
US10282371B1 (en) 2014-12-02 2019-05-07 Western Digital Technologies, Inc. Object storage device with probabilistic data structure
US9269393B1 (en) 2014-12-08 2016-02-23 Western Digital Technologies, Inc. Electronic system with data refresh mechanism and method of operation thereof
US10282096B1 (en) 2014-12-17 2019-05-07 Western Digital Technologies, Inc. Identification of data with predetermined data pattern
US9281009B1 (en) 2014-12-18 2016-03-08 Western Digital Technologies, Inc. Data storage device employing variable size interleave written track segments
US9076474B1 (en) 2014-12-23 2015-07-07 Western Digital Technologies, Inc. Data storage device attenuating thermal decay effect on fly height measurement
US9311939B1 (en) 2014-12-23 2016-04-12 Western Digital Technologies, Inc. Write-through media caching
US9257143B1 (en) 2014-12-23 2016-02-09 Western Digital Technologies, Inc. Precautionary measures for data storage device environmental conditions
US9842622B1 (en) 2014-12-23 2017-12-12 Western Digital Technologies, Inc. Data storage device having improved read failure tolerance
US9257134B1 (en) 2014-12-24 2016-02-09 Western Digital Technologies, Inc. Allowing fast data zone switches on data storage devices
US10365836B1 (en) 2015-01-27 2019-07-30 Western Digital Technologies, Inc. Electronic system with declustered data protection by parity based on reliability and method of operation thereof
US9099134B1 (en) 2015-01-27 2015-08-04 Western Digital Technologies, Inc. Data storage device employing multiple jog profiles for a butterfly written disk surface
US9672107B1 (en) 2015-02-11 2017-06-06 Western Digital Technologies, Inc. Data protection for a data storage device
US9933955B1 (en) 2015-03-05 2018-04-03 Western Digital Technologies, Inc. Power safe write buffer for data storage device
US9318137B1 (en) 2015-03-13 2016-04-19 Western Digital Technologies, Inc. Data storage device executing retry operation by buffering signal samples at different radial offsets
US9196302B1 (en) 2015-03-18 2015-11-24 Western Digital Technologies, Inc. Electronic system with media maintenance mechanism and method of operation thereof
US9183877B1 (en) 2015-03-20 2015-11-10 Western Digital Technologies, Inc. Data storage device comprising two-dimensional data dependent noise whitening filters for two-dimensional recording
US9870281B1 (en) 2015-03-20 2018-01-16 Western Digital Technologies, Inc. Power loss mitigation for data storage device
US9384774B1 (en) 2015-03-23 2016-07-05 Western Digital Technologies, Inc. Data storage device calibrating a laser power for heat assisted magnetic recording based on slope of quality metric
US9368131B1 (en) 2015-04-03 2016-06-14 Western Digital (Fremont), Llc Data storage device employing mirrored cross-track profiles for top and bottom disk surfaces
US9502068B1 (en) 2015-04-08 2016-11-22 Western Digital Technologies, Inc. Data storage device updating laser power during non-write mode for heat assisted magnetic recording
US9361938B1 (en) 2015-04-16 2016-06-07 Western Digital Technologies, Inc. Disk defect management for a data storage device
US9472219B1 (en) 2015-05-01 2016-10-18 Western Digital Technologies, Inc. Data storage device calibrating parameter for heat assisted magnetic recording
US9588898B1 (en) 2015-06-02 2017-03-07 Western Digital Technologies, Inc. Fullness control for media-based cache operating in a steady state
US9466321B1 (en) 2015-06-05 2016-10-11 Western Digital Technologies, Inc. Angular position tracking of data accesses to mitigate risk of data loss
US9842617B1 (en) 2015-06-29 2017-12-12 Western Digital Technologies, Inc. Electronic system with head management mechanism and method of operation thereof
US9639287B1 (en) 2015-06-29 2017-05-02 Western Digital Technologies, Inc. Write command reporting
US9368132B1 (en) 2015-09-04 2016-06-14 Western Digital Technologies, Inc. Data storage device employing differential write data signal and differential write pattern signal
US9437242B1 (en) 2015-09-14 2016-09-06 Western Digital Technologies, Inc. Data storage device employing different frequency preambles in adjacent data tracks
US9959052B1 (en) 2015-09-17 2018-05-01 Western Digital Technologies, Inc. Media based cache for data storage device
US9761273B1 (en) 2015-11-03 2017-09-12 Western Digital Technologies, Inc. Data storage device encoding and interleaving codewords to improve trellis sequence detection
US10063257B1 (en) 2015-11-03 2018-08-28 Western Digital Technologies, Inc. Data storage device encoding and interleaving codewords to improve trellis sequence detection
US10056920B1 (en) 2015-11-03 2018-08-21 Western Digital Technologies, Inc. Data storage device encoding and interleaving codewords to improve trellis sequence detection
CN112311787B (en) * 2020-10-28 2022-04-22 深圳市启望科文技术有限公司 Recording file segment encryption method and device, computer equipment and storage medium
CN114640867A (en) * 2022-05-20 2022-06-17 广州万协通信息技术有限公司 Video data processing method and device based on video stream authentication

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997043761A2 (en) * 1996-05-15 1997-11-20 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5488409A (en) * 1991-08-19 1996-01-30 Yuen; Henry C. Apparatus and method for tracking the playing of VCR programs
NO933204D0 (en) * 1993-09-08 1993-09-08 Symre As Data processing device and use of the same
US5592555A (en) 1994-04-12 1997-01-07 Advanced Micro Devices, Inc. Wireless communications privacy method and system
US5687237A (en) 1995-11-13 1997-11-11 Pitney Bowes Inc. Encryption key management system for an integrated circuit
US5931947A (en) 1997-09-11 1999-08-03 International Business Machines Corporation Secure array of remotely encrypted storage devices

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997043761A2 (en) * 1996-05-15 1997-11-20 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004081744A2 (en) * 2003-03-11 2004-09-23 Thomson Licensing S.A. Content protection for digital recording
WO2004081744A3 (en) * 2003-03-11 2004-11-11 Thomson Licensing Sa Content protection for digital recording
WO2006062953A2 (en) 2004-12-08 2006-06-15 James William Fahrny Method and system for securing content in media systems
EP1820292A2 (en) * 2004-12-08 2007-08-22 William Helms Method and system for securing content in media systems
EP1820292A4 (en) * 2004-12-08 2013-12-25 William Helms Method and system for securing content in media systems

Also Published As

Publication number Publication date
AU2001293289A1 (en) 2002-04-15
US6851055B1 (en) 2005-02-01

Similar Documents

Publication Publication Date Title
US6851055B1 (en) Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features
US6853731B1 (en) Digital video recorder employing a unique ID to interlock with encrypted video programs stored on a storage device
US6851063B1 (en) Digital video recorder employing a file system encrypted using a pseudo-random sequence generated from a unique ID
EP1843343B1 (en) Method and device for controlling distribution and use of digital works
JP5362675B2 (en) Key distribution by memory device
JP3819160B2 (en) Information management method and information management apparatus
JP5256326B2 (en) Record carrier, method for writing information on record carrier and computer system
US7237124B2 (en) Contents recorder/reproducer
KR970008024A (en) Signal recording apparatus / signal reproducing apparatus and signal recording medium
JP4698840B2 (en) Method and system for providing copy protection on a storage medium and storage medium used in such a system
US7869595B2 (en) Content copying device and content copying method
KR20060002099A (en) Multimedia device having encryption module
JP2004522252A (en) Apparatus and method for reproducing user data
US20060075262A1 (en) Apparatus and method for securely storing data
JP2004013763A (en) Information storage device and information storage method
KR100209674B1 (en) Copy preventing method for dvd
KR100636223B1 (en) Apparatus and method for doing backup of contents using RFID
JP2000315175A (en) Data writer, data reader, storage medium and key sharing method
JP2002259217A (en) Data processor provided with secret data compensation and illegal alteration suppress function and method
KR20040073042A (en) copy prevention method of broadcasting signal of digital TV
JP2007207407A (en) System with read protecting function

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 69 EPC (EPO FORM 1205A OF 180803)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP